2000, 11(4):427-434.
Abstract:Concurrent TTCN (tree and tabular combined notation) is a test notation that can handle concurrent test behaviors. This paper proposes an approach to the conformance testing of distributed routing protocols based on concurrent TTCN. It first discusses the test architecture for the routing protocol entity, and then the concurrent TTCN based test system design is presented. Finally, this paper introduces the test suite design.
2000, 11(4):435-440.
Abstract:In this paper, starting from point-point and line-line correspondence, a detailed description of the calculation of projection parameters for 2D video features and 3D model features correspondence is presented firstly. Then a detailed description of the calculation of projection parameters for 2D human video features and 3D human model features correspondence is given. At the same time, an animation example of human walking is introduced which is produced by an animation system called Video&Animation Studio. The system is designed according to the above idea.
2000, 11(4):441-452.
Abstract:It is proved that every element [c]∈R wtt /M wtt except the greatest and least elements is branching in R wtt /M wtt, i.e., the greatest lower bound of some two elements greater than [c], where R wtt /M wtt is the quotient of the r.e. wtt degrees wtt modulo the cappable r.e. wtt degrees M wtt.
2000, 11(4):447-452.
Abstract:In this paper, the numerical approximation characteristics of fuzzy system are discussed, and the influence of approximation error and initial state error on fuzzy system are analyzed. Finally, an important conclusion is obtained that under some conditions, fuzzy system output differs little from that of the actual system.
GAO Yang , LIU Hai-tao , ZHOU Zhi-hua , CHEN Zhao-qian
2000, 11(4):453-460.
Abstract:In this paper, a hybrid multi-concept acquisition system HMCAS is proposed. HMCAS can perform incremental supervised learning on arbitrary sequences composed of analog or binary inputs. The kernel algorithm of HMCAS, named HMCAP, which integrates symbolic and neural learning based on the probability of instance space, has the ability of generating concept descriptions in the form of hybrid decision tree. The prototype system of HMCAS has been applied to the field of typhoon forecasting and achieved successful result.
PAN Zhi-geng , JIANG Xiao-hong , ZHANG Ming-min , SHI Jiao-ying
2000, 11(4):461-467.
Abstract:In DVE (distributed virtual environment), multiple users or environments located in different places connect to each other by network. Users can share information and perform interaction. Based on their studies, the authors give an overview of the research work done in the field of DVE in this paper, including its origin, requirements and features, model and architecture, typical systems and key techniques. Finally, some existing problems which need the further study and the further development of DVE are discussed.
DUAN Hai-xin , DUAN Hai-xin , WU Jian-ping
2000, 11(4):468-472.
Abstract:A management model is proposed for the network management system based on Web and relational database in this paper. With this model, the components and implementation of a management system, Super-Domain, are described. Some key problems and their solutions, which include the storage model of management information, the maintenance of data consistency, the mechanism of real time alarming based on Web and the mechanism of system security, are also discussed.
WEI Ou , WU Jian , SUN Yu-fang
2000, 11(4):473-480.
Abstract:In this paper, a popular statistics-based training and tagging method for Chinese texts is studied, and the nonlinear relation between training set and tagging accuracy is analyzed from the aspects of the structure and numerical value of the matrix of transition probabilities and the matrix of symbol probabilities. In order to make use of training corpus sufficiently and get the higher tagging accuracy, the training and tagging method is improved from two aspects: using other grammatical attributes of words, and strengthening the processing of unknown words. With the improved method, open test and close test showed that the overall accuracies are about 96.5% and 96% respectively.
WANG Yun-feng , LI Bi-xin , ZHENG Guo-liang
2000, 11(4):481-486.
Abstract:The inheritance relation of COOZ is discussed. It is divided into increasing inheritance and subtyping inheritance. The latter is studied and a behavioral subtyping inheritance is defined, by which the specification inheritance and its inference rules are defined. The soundness of the method is proved. The offered method is constructive compared with that of E. Cusack and is more flexible than that of Liskov et al.
QI Yuan , TIAN Jie , DENG Xiang
2000, 11(4):488-493.
Abstract:Automated fingerprint identification system (AFIS) has been studied widely because it s convenient, quick and exact in personal verification field. In this paper, a fingerprint minutia first matching method is proposed based on the structural features of minutia, and a genetic algorithm is applied to the further point matching phase. This method has given good results in automated fingerprint identification system (AFIS).
LU Jia , WEN Dong-chan , WANG Ding-xing
2000, 11(4):494-501.
Abstract:Object-Oriented concurrent languages can help programmers to develop concurrent programs and to gain benefits by using object-oriented technology, such as encapsulation and inheritance. But inheritance anomaly influences designing object-oriented concurrent languages. Ada95 is one of the object-oriented languages that support concurrent program designing, but it does not support the inheritance of protected objects. Ada-I language based on Ada95 supports the inheritance of protected objects, and can avoid the inheritance anomaly.
YANG Meng-zhou , SHI Jiao-ying
2000, 11(4):502-506.
Abstract:In computer graphics, it's difficult to acquire realistic 3D scenes from the real world. In this paper, a novel 3D scene model reconstruction algorithm is presented to deal with this problem. This method reconstructs photo-realistic scene models according to the color and texture of basic input photos, which are distributed in the environment. This method can be used to reconstruct photo-realistic 3D model of complex real objects.
CHEN Yu , LI Chun-jiang , YANG Xue-jun , CHEN Fu-jie
2000, 11(4):507-514.
Abstract:Reducing communication overhead is one of the goals of parallel compiling optimization. According to the characteristics of CC-NUMA parallel architecture, the authors propose some strategies and methods to optimize the communication of parallel programs by combining computing transformation and data transformation based on unified algebraic representation in this paper. Experimental results of optimization are presented, and the efficiency of the optimization policies and the methods is proved.
ZHAO Xin , CHEN Dao xu , XIE Li
2000, 11(4):515-519.
Abstract:There is a kind of active attack based on TCP over the Internet, which is called IP Hijack. This kind of attack is different from the passive attack based on network sniffing. It can bypass the protection of system password and S/KEY, and get full control of the link between two end points. This can cause great harm to the network system. In this paper, the principle of this kind of attack is analyzed, the attack detecting technology and the protecting measures against IP Hijack are also given.
WANG Ying , JIN Tao , SUN Yu-fang
2000, 11(4):520-252.
Abstract:An SCSI (small computer system interface) driver automatic generator has been developed for developing SCSI drivers efficiently. The generator can automatically maintain SCSI subsystem code, generate most driver modules, package, and provide drivers under the master and slave running modes. In this paper, the authors present the automatic generator's design method, system control flow, data flow, system modules and hierarchy, interface and running processing. The paper describes in brief the system implementation, including the module management, automatic packaging, and model generation.
GONG Yu-chang , ZHOU Xue-hai , WEN Dong-hui , ZHAO Zhen-xi
2000, 11(4):526-531.
Abstract:The design principles and methods of the hypermedia engine are discussed in this paper, and an open hypermedia engine based on OODBMS (object-oriented database management systems) is presented. By introducing meta-object modeling, the engine can not only express complex hypermedia semantic, but also support the open hypermedia link protocol for integrating the third-part applications.
2000, 11(4):532-539.
Abstract:This paper presents a new view synthesis technique using image morphing and 2-D discrete wavelet transform. The paper aims at pairwise images that are known without camera calibration and any other geometric information. Firstly, estimate the fundamental matrix related with any pair of images by techniques from stereovision. Using fundamental matrix, any pair of image planes can be rectified to be parallel and their corresponding points lie on the same scanline. Secondly, the paper describes an image morphing algorithm running in the wavelet domain. The proposed algorithm can synthesize new views more quickly. Any quantization techniques can be embedded here to compress the coefficients in depth. When displaying, compressed images are decoded and an inverse wavelet transform is achieved. Finally, a postwarping procedure is used to transform the interpolated views at desired position. Nice features of using wavelet transformation are its good locality in both space and frequency and its multiresolution representation mode, which makes the generated views be refined progressively and hence is suitable for communication. Also, the paper discusses the influences of different kinds of wavelet on the results.
DUI Ji-ying , WANG Yun , GU Guan-qun
2000, 11(4):540-544.
Abstract:In the OMG's COM/CORBA interworking specification, interworking between COM and CORBA is implemented via bridges. Though the interworking model is flexible, it needs heavy overheads which leads to poor performance. Moreover, there are problems in its object life-cycle mapping. It does not provide portability either. In this paper, a COM/CORBA interworking model is proposed based on multi-interface object integration method. In the new model, a client can directly access a foreign object, therefore interworking performance is improved remarkably. In addition, it enhances interworking transparency and provides application portability between COM and CORBA environments.
LU Zeng-xiang , GUAN Hong-chao , LI Yan-da
2000, 11(4):545-550.
Abstract:Information filtering is an important method to alleviate information overload. How to express user's information needs and how to rank them are two main problems in this area. This paper focuses on these two problems. Bookmark service, the solution that is an extension of bookmark function in browser, is used to catch user's information needs. The evaluation of the documents is used to represent user's information needs. Maxine Margin method, a novel ranking algorithm, is designed to increase precision. An experiment proves that it performs better than the traditional methods. A system called Bookmark Service System is designed for implementation. The system construction is given, and its main function is also introduced.
2000, 11(4):551-556.
Abstract:In heterogeneous parallel computing systems based on message passing, every processor or computer has capability of scheduling and executing jobs autonomously and independently. For high performance computing, a processor, which originally has a divisible job, can call other heterogeneous processors for co computing with load sharing so that job completing time can be decreased. In this paper, a scheme for load sharing in heterogeneous computing is presented. Firstly, invoking load sharing protocol,the originating processor collects available data such as load sharing interval time and computing power from its partners.Secondly,a function is constructed which represents the relationshop between the total job magnitude and the job completion time.The function is essential for choosing a suite of appropriate processors,optimally partitionng and scheduling jobs,as well as minimizing the job completing time.Finally,an efficient algorithm is proposed through the examples in application and experiments.The algorithm is real-time at the moment when the job is just started,and can be extended to the situation of multiple jobs originated at multiple processors.
2000, 11(4):557-562.
Abstract:In this paper, an St (subprogram-type) graph is introduced to represent the relation between subprograms and types in programs. Several module cohesion metrics are discussed, and the effects of adding a subprogram to or deleting a subprogram from a module are analyzed based on module cohesion. An object-extracting algorithm is proposed.
REN Shi-jun , HONG Bing-rong , HONG Bing-rong
2000, 11(4):563-568.
Abstract:Collision detection algorithms play a very important role in the field of robot path planning. In a simulation system of intelligent robot, collision detection takes up a large portion of the time for the robot to plan a complete path from the initial position to the final position. So how to reduce the time the robot uses to detect collision becomes a key problem. But collision detection finally will transform to a problem to determine whether the intersection of two convex regions formed by linear inequalities is empty or not. The authors present a new algorithm in this paper. Firstly, a vector pointing from one polyhedron to the other is picked. Then the authors start to find an intersection plane of one polyhedron based on the scalar product of the norm vector of the plane and the picked vector. If such a plane is found, the intersection of the two convex polyhedra is not empty.